Volume 3,Issue 1,2018 Table of Contents

   
Other Issues:  
  

Contents

Several Methods of Exploiting Glibc Heap
  PEI Zhongyu, ZHANG Chao and DUAN Haixin
  Published March 1, 2018
  2018,3(1):1-15 [Abstract]  [View PDF(935.57 K)]
  
FROPUF: To Extract More Entropy from Two Ring Oscillators in FPGA-Based PUFs
  LI Changting, ZHANG Qinglong, LIU Zongbin and JING Jiwu
  Published March 1, 2018
  2018,3(1):16-30 [Abstract]  [View PDF(1.33 M)]
  
Elimination of Memory Disclosure Attacks based on AMD Memory Encryption
  WU Yuming, LIU Yutao and CHEN Haibo
  Published March 1, 2018
  2018,3(1):31-47 [Abstract]  [View PDF(875.14 K)]
  
A Survey of Security Threats and Defending Technologies on IoT Smart Devices
  WANG Yazhe, ZHANG Chengyi, HUO Dongdong and LI Jialin
  Published March 1, 2018
  2018,3(1):48-67 [Abstract]  [View PDF(2.20 M)]
  
A Pollution-resilient Hybrid P2P Botnet
  YIN Jie, CUI Xiang, FANG Binxing, YI Longhao and ZHANG Fangjiao
  Published March 1, 2018
  2018,3(1):68-82 [Abstract]  [View PDF(3.23 M)]
  
Image Steganalysis Based on Linear Programing Feature Selection and Ensemble Classifier
  GUAN Qingxiao, ZHU Jie, ZHAO Xianfeng, YU Haibo and LIU Changjun
  Published March 1, 2018
  2018,3(1):83-94 [Abstract]  [View PDF(688.58 K)]
  
The Development of Encryption Techniques for Cloud Email Security
  XU Peng, CHEN Tianyang and JIN Hai
  Published March 1, 2018
  2018,3(1):95-110 [Abstract]  [View PDF(2.24 M)]
  
On the Survey of Network Attack Source Traceback
  JIANG Jianguo, WANG Jizhi, KONG Bin, HU Bo and LIU Jiqiang
  Published March 1, 2018
  2018,3(1):111-131 [Abstract]  [View PDF(620.43 K)]
  
Research Progress on Security Processor
  ZHAO Jianfeng and SHI Gang
  Published March 1, 2018
  2018,3(1):132-144 [Abstract]  [View PDF(554.47 K)]